2021 EOC Part B

Question 1

Essay

Read the four sources carefully, focusing on a theme or issue that connects them and the different perspective each represents. Then, write a logically organized, well-reasoned, and well-written argument that presents your own perspective on the theme or issue you identified. You must incorporate at least two of the sources provided and link the claims in your argument to supporting evidence. You may also use the other provided sources or draw upon your own knowledge. In your response, refer to the provided sources as Source A, Source B, Source C, or Source D, or by the author’s name.

From “The privacy paradox: we claim we care about our data, so why don’t our actions match?” By Ivano Bongiovanni, Karen Renaud, and Noura Aleisa (The Conversation, July 29, 2020)

Imagine how you’d feel if you discovered footage from your private home security camera had been broadcast over the internet. This is exactly what happened to several unsuspecting Australians last month, when the website Insecam streamed their personal lives online.

According to an ABC report, Insecam broadcasts live streams of dozens of Australian businesses and homes at any given time. Some cameras can be accessed because owners don’t secure them. Some may be hacked into despite being “secured.”

When asked if they care about their personal information being shared online, most people say they do. A 2017 survey found 69% of Australians were more concerned about their online privacy than in 2012.

However, a much smaller percentage of people actually take the necessary actions to preserve their privacy. This is referred to as the “privacy paradox”, a concept first studied about two decades ago.

To investigate this phenomenon further, we conducted a research project1 and found that, despite being concerned about privacy, participants were willing to sacrifice some of it in exchange for the convenience afforded by an internet-connected device.

Unpacking the privacy paradox

Any “smart” device connected to the internet is called an Internet of Things (IoT) device. These can be remotely monitored and controlled by the owners.

The projected growth of IoT devices is staggering. By 2025, they’re expected to reach 75.44 billion—an increase of 146% from 2020.

Are device owners genuinely concerned about their privacy? Recent worldwide anxiety about personal information shared through . . . tracing apps seems to suggest so.

But as the privacy paradox highlights, users expressing privacy concerns often fail to act in accordance with them. They freely divulge personal information in exchange for services and convenience.

Explanations for the privacy paradox abound. Some suggest:

people find it difficult to associate a specific value to their privacy and therefore, the value of protecting it people do not consider their personal information to be their own and thus might not appreciate the need to secure it people completely lack awareness of their right to privacy or privacy issues and believe their desired goals (such as a personalised experience) outweigh the potential risks (such as big tech companies using their data for profiling).

The likely explanation for the privacy paradox is a mix of all these factors.

What if we proved your device harvests data?

To understand whether and how the privacy paradox applies to IoT devices, we conducted an experiment involving 46 Saudi Arabian participants. This is because in Saudi Arabia the use of IoT is exploding and the country does not have strong privacy regulations.

We gave participants a smart plug that let them switch a table lamp on or off using an app on their smartphone. We then showed them the device’s privacy policy and measured participants’ privacy concerns and trust in the device. None of the participants read the privacy policy. They simply agreed to commence with the study.

After two hours, we presented evidence of how much of their data the IoT-connected plug was harvesting, then remeasured their privacy concerns and trust

After the participants saw evidence of privacy violation, their privacy concerns increased and trust in the device decreased. However their behaviour did not align with their concern, as shown by the fact that:

15 participants continued to use the device regardless 13 continued to use it with their personal information removed only three opted to block all outbound traffic to unusual IP addresses.

The rest preferred “light-touch” responses, such as complaining on social media, complaining to the device’s manufacturer or falsifying their shared information.

After one month, we measured participants’ attitudes a third time and discovered their privacy concerns and trust in the device had reverted to pre-experiment levels.

From 1984

By George Orwell (Secker & Warburg, 1949)

Behind Winston’s back the voice from the telescreen was still babbling away about pig-iron and the overfulfilment of the Ninth Three-Year Plan. The telescreen received and transmitted simultaneously. Any sound that Winston made, above the level of a very low whisper, would be picked up by it, moreover, so long as he remained within the field of vision which the metal plaque commanded, he could be seen as well as heard. There was of course no way of knowing whether you were being watched at any given moment. How often, or on what system, the Thought Police plugged in on any individual wire was guesswork. It was even conceivable that they watched everybody all the time. But at any rate they could plug in your wire whenever they wanted to. You had to live—did live, from habit that became instinct—in the assumption that every sound you made was overheard, and, except in darkness, every movement scrutinized.

Winston kept his back turned to the telescreen. It was safer, though, as he well knew, even a back can be revealing. A kilometer away the Ministry of Truth, his place of work, towered vast and white above the grimy landscape. [It] was startlingly different from any other object in sight. It was an enormous pyramidal structure of glittering white concrete, soaring up, terrace after terrace, 300 meters into the air. From where Winston stood it was just possible to read, picked out on its white face in elegant lettering, the three slogans of the Party:

WAR IS PEACE

FREEDOM IS SLAVERY

IGNORANCE IS STRENGTH

…Scattered about London there were just three other buildings of similar appearance and size. So completely did they dwarf the surrounding architecture that from the roof of Victory Mansions you could see all four of them simultaneously. They were the homes of the four Ministries between which the entire apparatus of government was divided. The Ministry of Truth, which concerned itself with news, entertainment, education, and the fine arts. The Ministry of Peace, which concerned itself with war. The Ministry of Love, which maintained law and order. And the Ministry of Plenty, which was responsible for economic affairs. . . .

Winston turned round abruptly. He had set his features into the expression of quiet optimism which it was advisable to wear when facing the telescreen. . . .

He went back to the living-room and sat down at a small table that stood to the left of the telescreen. From the table drawer he took out a penholder, a bottle of ink, and a thick, quarto-sized blank book with a red back and a marbled cover.

For some reason the telescreen in the living-room was in an unusual position. Instead of being placed, as was normal, in the end wall, where it could command the whole room, it was in the longer wall, opposite the window. To one side of it there was a shallow alcove in which Winston was now sitting, and which, when the flats were built, had probably been intended to hold bookshelves. By sitting in the alcove, and keeping well back, Winston was able to remain outside the range of the telescreen, so far as sight went. He could be heard, of course, but so long as he stayed in his present position he could not be seen. It was partly the unusual geography of the room that had suggested to him the thing that he was now about to do

From “Stop Screening Job Candidates’ Social Media” (Harvard Business Review, 2021)

Social media sites . . . have given many organizations a new hiring tool. According to a 2018 CareerBuilder survey, 70% of employers check out applicants’ profiles as part of their screening process, and 54% have rejected applicants because of what they found. Social media sites offer a free, easily accessed portrait of what a candidate is really like, yielding a clearer idea of whether that person will succeed on the job—or so the theory goes.

However, new research suggests that hiring officials who take this approach should use caution: Much of what they dig up is information they are ethically discouraged or legally prohibited from taking into account when evaluating candidates—and little of it is predictive of performance.

In the first of three studies, the researchers examined the Facebook pages of 266 U.S. job seekers to see what they revealed. Some of the information that job seekers had posted—such as education, work experience, and extracurricular activities—covered areas that organizations routinely and legitimately assess during the hiring process. But a significant share of profiles contained details that companies may be legally prohibited from considering, including gender, race, and ethnicity (evident in 100% of profiles), disabilities (7%), pregnancy status (3%), sexual orientation (59%), political views (21%), and religious affiliation (41%). Many of the job seekers’ profiles also included information of potential concern to prospective employers: 51% of them contained profanity, 11% gave indications of gambling, 26% showed or referenced alcohol consumption, and 7% referenced drug use.

“You can see why many recruiters love social media—it allows them to discover all the information they aren’t allowed to ask about during an interview,” says Chad Van Iddekinge, a professor at the University of Iowa and one of the study’s researchers. . . .

In the second study, the researchers explored whether such information affects recruiters’ evaluations. They asked 39 recruiters to review the Facebook profiles of 140 job seekers . . . and rate each candidate’s hireability. The researchers then mapped the recruiters’ ratings against the content in each profile. Although the recruiters clearly took heed of legitimate criteria, they were also swayed by factors that are supposedly off-limits, such as relationship status (married and engaged candidates got higher marks, on average, than their single counterparts), age (older individuals were rated more highly), gender (women had an advantage), and religion (candidates who indicated their beliefs got lower ratings). Factors such as profanity, alcohol or drug use, violence, and sexual behavior lowered ratings; extracurricular activities had no effect on scores.

In their final study, the researchers probed the end goal of social-media mining: hiring better people. They obtained supervisors’ ratings for 81 of the job seekers in the second study (chosen randomly) after six to 12 months of employment and surveyed those employees about whether they intended to stay in their jobs. They then asked a new set of recruiters to assess the Facebook profiles. . . . One group proceeded without any special instructions. The other was trained in best practices for evaluating social media information. . . . Neither group’s assessments of the candidates accurately predicted job performance or turnover intentions, indicating that even with careful instruction, hiring officials stand to gain little from probing applicants’ online activity. . . .

What about using social media solely as a negative screen—that is, to identify any warning signs, such as overt racism or misogyny? “We didn’t study that,” says Liwen Zhang, a lecturer at the University of New South Wales and the research paper’s lead author. “But our research shows that a recruiter will be influenced by everything she sees on a social media site, so if companies want to look for red flags, they should have someone other than the hiring manager do so.” . . .

[T]he researchers recommend that hiring managers resist the temptation to pore over candidates’ social media pages. “We aren’t saying that the information there is useless,” Van Iddekinge says, “but we don’t yet have the tools to find the signal in all the noise.”

From “Americans and Privacy: Concerned, Confused and Feeling Lack of Control Over Their Personal Information” By Brooke Auxier, Lee Rainie, Monica Anderson, Andrew Perrin, Madhu Kumar and Erica Turner (Pew Research Center, Nov 2019)

More than eight-in-ten Americans are concerned about the amount of personal information social media sites and advertisers know about them % who say they are concerned a lot or a little about how much personal information ___ might know about them

Roughly seven-in-ten Americans think all or most of what they do online is tracked by companies; about half say the same about government

% of U.S. adults who say ___ of what they do online or on their cellphone, or offline (like where they go and who they talk to), is being tracked by . . .

Only a minority of the public say they understand what companies or the government do with the data collected about them

% of U.S. adults who say they understand ___ about what is being done with the data collected about them by . . .

Teach with AI superpowers

Why teachers love Class Companion

Import assignments to get started in no time.

Create your own rubric to customize the AI feedback to your liking.

Overrule the AI feedback if a student disputes.

Other AP European History Assignments